Tue.Oct 24, 2023

article thumbnail

1Password Finds 'Suspicious Activity' Tied to Okta Breach

Data Breach Today

Stolen Customer Support Files From Okta Used to Attack 1Password, BeyondTrust Widely used password management software provider 1Password said a hacker breached had one of its systems but failed to steal any sensitive data, after stealing a valid session cookie from the customer support system of its access and identity management provider, Okta.

Passwords 299
article thumbnail

Shared Drives & Email as Low-Hanging InfoGov Fruit

Weissman's World

If you know – or have been told – you have to do SOMETHING to get a grip on your exploding piles of information … and you’ve been given next-to-no resources to get anything done … then let me remind you that you don’t have wait until you can do it all. No, you can start small,… Read More » Shared Drives & Email as Low-Hanging InfoGov Fruit The post Shared Drives & Email as Low-Hanging InfoGov Fruit appeared first on Holly Group.

Cleanup 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keyfactor Earns $1.3B Valuation After Sale of Minority Stake

Data Breach Today

Funds Comes Two Years After Insight-Backed Keyfactor Merged With CA Vendor PrimeKey A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.

Sales 297
article thumbnail

'Log in with.' Feature Allows Full Online Account Takeover for Millions

Dark Reading

Hundreds of millions of users of Grammarly, Vidio, and the Indonesian e-commerce giant Bukalapak are at risk for financial fraud and credential theft due to OAuth misfires -- and other online services likely have the same problems.

Risk 141
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Attack on Shared IT Supplier Affects 5 Hospitals in Ontario

Data Breach Today

Nonemergency Patients Asked to Cancel or Reschedule Appointments During Outage A cyberattack on a shared IT services organization is forcing five member hospitals in Ontario to cancel or reschedule patient appointments and steer nonemergency patients to other facilities. Attacks against third-party vendors are rising, and many regional hospitals are unprepared.

IT 293

More Trending

article thumbnail

Experts Urge Safeguards Before AI Can 'Feign Obedience'

Data Breach Today

Academics Call for Adoption of AI Guardrails to Prevent Potential Existential Risk Leading artificial intelligence experts are calling on governments and tech companies to swiftly develop safeguards for AI systems to mitigate potential existential threats posed by the technology. More capable future AI systems might "learn to feign obedience" to human directives, they say.

article thumbnail

Artificial Governance Resources

AIIM

AI Governance Resources Patricia C. Franks and Scott Cameron provided this list of helpful resources. Be sure to check out their AIIM blog post about paradata and documenting artificial intelligence (AI) processes.

article thumbnail

Report Suggests CISA Should Dominate Federal Cybersecurity

Data Breach Today

Federal Civilian Agencies 'Are Likely to Resist This Dramatic Change,' Report Says A study of federal government cybersecurity suggests the Department of Homeland Security could play a more prominent role in securing civilian networks, in a report that touts a "more centralized defensive strategy." CISA doesn't approach the authority of its military equivalent, the JFHQ-DODIN.

article thumbnail

News alert: Lumifi seeking to acquire MDR cybersecurity firms to accelerate growth

The Last Watchdog

Scottsdale, Ariz., Oct. 24, 2023 — Lumifi , a cybersecurity industry leader, is embarking on a strategic expansion plan by targeting cybersecurity firms. This strategic direction gains its foundation from Lumifi’s recent landmark acquisition, Castra, valued at $14 million, which further fortifies the SOC Visibility Triad, a concept initially introduced in a Gartner® research report titled “ Apply Network-Centric Approaches for Threat Detection and Response “ 1 We believ

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Censys Gets $75M to Grow Globally, Spend on Cloud, Analytics

Data Breach Today

New Capital, Debt Funding Will Help Censys Analyze History of Vulnerable Data A threat hunting and exposure management startup led by ex-OneLogin CEO Brad Brooks received $75 million to invest in cloud and analytics and growing globally. Censys said the combined equity and debt funding will allow the company to offer a more complete look at the history of vulnerable data.

Analytics 266
article thumbnail

Experts released PoC exploit code for VMware Aria Operations for Logs flaw. Patch it now!

Security Affairs

VMware is aware of the availability of a proof-of-concept (PoC) exploit code for an authentication bypass flaw in VMware Aria Operations for Logs. VMware warned customers of the availability of a proof-of-concept (PoC) exploit code for an authentication bypass vulnerability, tracked as CVE-2023-34051 , in VMware Aria Operations for Logs (formerly known as vRealize Log Insight).

IT 119
article thumbnail

A Better Way to Cover the Bases for Breach Protection

Data Breach Today

The biggest challenges in threat detection and response today are the inability to cover the entire attack surface and a lack of insight into who is attacking and why. To address these issues, Cisco introduced Breach Protection, a suite of products that combines email, endpoint and XDR protection.

265
265
article thumbnail

Unlocking AI’s Strategic Imperative: From Proof of Concept to Production

Hanzo Learning Center

We will likely now all agree that the latest generation of AI has emerged as a game-changer. Its potential is undeniable and prevalent across every sector, industry, and use case. Yet, many enterprises remain stuck in the "Proof of Concept" (POC) phase due to various barriers, testing the waters but never diving in. It's time to move beyond this and build real-world applications using AI.

IT 117
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

On Point: Overcoming Vulnerability Management Challenges

Data Breach Today

Security Director Ian Keller on Addressing Telecommunications Industry Challenges The unique characteristics of the telecommunications industry pose significant challenges to the implementation of robust vulnerability management programs. Security director Ian Keller lists the top four challenges and discusses strategies to overcome them.

Security 178
article thumbnail

It's Time to Establish the NATO of Cybersecurity

Dark Reading

Cybercriminals already operate across borders. Nations must do the same to protect their critical infrastructure, people, and technology from threats foreign and domestic.

article thumbnail

New England Biolabs leak sensitive data

Security Affairs

On September 18th, the Cybernews research team discovered two publicly hosted environment files (.env) attributed to New England Biolabs. Leaving environment files open to the public is one of the simplest mistakes that web admins can make, but it can have disastrous consequences. Despite leaving some of its sensitive credentials exposed, New England Biolabs seems to have dodged a bullet.

article thumbnail

1Password Becomes Latest Victim of Okta Customer Service Breach

Dark Reading

Okta's IAM platform finds itself in cyberattackers' sights once again, as threat actors mount a supply chain attack targeting Okta customer support engagements.

120
120
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Former NSA employee pleads guilty to attempted selling classified documents to Russia

Security Affairs

A former NSA employee has pleaded guilty to charges of attempting to transmit classified defense information to Russia. Jareh Sebastian Dalke (31), a former NSA employee has admitted to attempting to convey classified defense information to Russia, pleading guilty to the charges. The man pleaded guilty today to six counts of attempting to transmit classified National Defense Information (NDI) to an agent of the Russian Federation (Russia).

article thumbnail

A Controversial Plan to Scan Private Messages for Child Abuse Meets Fresh Scandal

WIRED Threat Level

An EU government body is pushing a proposal to combat child sexual abuse material that has significant privacy implications. Its lead advocate is making things even messier.

Privacy 110
article thumbnail

How did the Okta Support breach impact 1Password?

Security Affairs

1Password detected suspicious activity on its Okta instance after the recent compromise of the Okta support system. The password management and security application 1Password announced it had detected suspicious activity on its Okta instance on September 29, but excluded that user data was exposed. The activity is linked to the recent attack on the Okta support case management system.

Archiving 111
article thumbnail

The Week in Cyber Security and Data Privacy: 16–22 October 2023

IT Governance

Welcome to a new series of weekly blog posts rounding up the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Publicly disclosed data breaches and cyber attacks City of Philadelphia discloses data breach after five months Date of breach: 24 May 2023 ( notice issued 20 October 2023).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Functionality Misuse from Multiple Legitimate Company Websites is the Latest Example of ‘Site Hopping’

KnowBe4

A new technique is becoming increasingly common as a way to bypass security scanners. The challenge is that the specific execution is constantly evolving, making it difficult to detect, but not impossible to spot.

article thumbnail

A Powerful Tool US Spies Misused to Stalk Women Faces Its Potential Demise

WIRED Threat Level

Though often viewed as the “crown jewel” of the US intelligence community, fresh reports of abuse by NSA employees and chaos in the US Congress put the tool's future in jeopardy.

IT 91
article thumbnail

Vietnam-Based Cyber Groups Using Fake Job Postings to Deliver Malware

KnowBe4

Several cybercriminal groups based in Vietnam are using fake job postings to trick users into installing malware, according to researchers at WithSecure. The researchers are tracking several related malware campaigns, including “DarkGate” and “Ducktail.

96
article thumbnail

CILIP awards Joseph Coelho, Alison Wheeler and Professor Briony Birdi with Honorary Fellowship

CILIP

CILIP awards Joseph Coelho, Alison Wheeler and Professor Briony Birdi with Honorary Fellowship The Chartered Institute of Library and Information Professionals (CILIP) has awarded its highest accolade, the Honorary Fellowship, to Joseph Coelho, Alison Wheeler, and Briony Birdi in recognition of their outstanding contributions to the library and information sectors.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

One Out of Every Eight Emails Found to be Malicious as Attackers Continue to Hone Their Skills

KnowBe4

An increase in the number of malicious emails being sent is resulting in more phishing attacks reaching inboxes. New data clarifies the factors that determine their malicious nature and identifies the most prevalent types of attacks.

article thumbnail

The AI-Generated Child Abuse Nightmare Is Here

WIRED Threat Level

Thousands of child abuse images are being created with AI. New images of old victims are appearing, as criminals trade datasets.

article thumbnail

Most Organizations Believe Malicious Use of AI is Close to Evading Detection

KnowBe4

As organizations continue to believe the malicious use of artificial intelligence (AI) will outpace its defensive use, new data focused on the future of AI in cyber attacks and defenses should leave you very worried.